Operating Systems - 7
Description: Test your knowledge on operating systems like UNIX,LINUX,XENIX | |
Number of Questions: 25 | |
Created by: Prajapati Rathore | |
Tags: UNIX TYPES OF UNIX OS BSD UNIX UNIX COMMANDS SHELL PROGRAMMING Basic Fundamentals Hardware and Software Computers Time and Distance Number Systems Error Identification Sentence Correction/Sentence Improvement |
_____ matrix is the representation of all access rights of all subjects to all objects in a computer system.
____ program may be written to steal user passwords.
MAC stands for _____.
____ are used to authenticate users.
Computer worms are _____.
The art of breaking ciphers is called _____.
____ are the secret points of entry without access authorization.
DAC stands for _____.
A cryptographic system that uses different keys for encryption and decryption is said to be _____.
A cryptographic system that uses the same key for both encryption and decryption is said to be _____.
In cryptography, the plain text is encrypted to get _____ text.
In cryptography, original unenciphered text is called _____ text.
Take and grant are two special _____.
____ is a graph-based model that describes a restricted class of protection systems.
_____ is a token that gives the subject possessing it permission to access a specific object.
_____ list is an enumeration of the specific access rights of all entities that are authorised to a given object.
_____ rings are a generalisation of the concept of a supervisor state.
The encryption method uses _____ as a parameter.
Which of the following are the common access control mechanisms?
Protection rings are introduced in _____.
False _____ ratio is the percentage of legitimate users who are denied access due to the failure of the authentication mechanism.
_____ domain is the collection of access rights.
False _____ ratio is the percentage of illegitimate users erroneously admitted.
Computer _____ is a piece of code that infect other programs.
Computer _____ can invade computers.